First published: Mon Aug 29 2022(Updated: )
Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit PDF Editor | >=11.0<11.1 | |
Foxit PDF Reader | >=11.0<11.1 | |
Foxit PhantomPDF | <10.1.6 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-41785.
Foxit PDF Reader versions before 11.1, PDF Editor versions before 11.1, and PhantomPDF versions before 10.1.6 are affected by this vulnerability.
Attackers can exploit this vulnerability by triggering a use-after-free and executing arbitrary code through mishandled JavaScript.
The severity level of this vulnerability is high with a CVSS score of 7.8.
To fix this vulnerability, update Foxit PDF Reader, PDF Editor, and PhantomPDF to version 11.1 or higher.